Looking for an overview of Digital Forensics & Digital Forensics and Incident Response (DFIR)? This post outlines the evolution of Digital Forensics, it's applications for law enforcement and the evolution of DFIR for InfoSec and corporate applicatio...

On average, US adults spend 2.5 hours/day on apps. They use 20 different apps each month. Increasing app use results in an overwhelming increase of evidence left within mobile apps. In this blog, we'll showcase how EnCase Mobile Investigator empower...

WannaCry and NotPetya are obviously big wake up calls. Long gone are the days when companies can expect to keep powerful malware out of their networks entirely. Today, sophisticated companies increasingly see themselves in a state of continuous compr...

Forensic security solutions from Guidance Software provide the 360-degree visibility you need to understand your data. We help protect the data for many of the largest organizations, in some of the most regulated industries, in the world. We understa...

Enforcement of the new EU General Data Protection Regulation (GDPR) goes into effect on May 25, 2018 with the potential for significant penalties for non-compliance. Have You Asked These 9 Questions About GDPR?

Data breaches are a fact of life. Fueled by headline after headline – many organizations obsess over the possibility of a breach, even to the detriment of their overall security profile. Businesses would be wiser to flip that thinking on its head – D...

Unless you spent a long weekend wandering in the woods, you have most likely heard of the massive global ransomware attack, “WannaCry.” Details continue to emerge, but much of what we are learning is troubling. Guidance Senior Director of Product dis...

Cyberattacks leveraging variants of the “WannaCry” ransomware hit hundreds of thousands of computers in 150 countries since Friday. If you logged on this morning to a popup like this on your computer, you should take some steps immediately.

Guidance collaborated with the SANS Institute as a co-sponsor of their latest survey, Next-Gen Endpoint Risks and Protections. The survey results help us better understand how the endpoint threat landscape changed in the last year and what IT securit...

The Judicial Advisory Committee recently issued new rules regarding admission of electronic evidence that will go into effect on December 1, 2017. The amendment to US Federal Rule of Evidence 902 promises to save everyone a significant amount of time...

With breaches constantly in the headlines, there are many reasons to conduct a cyber threat assessment, but listed below are four of the best. In this post Sr. Technical Manager Paul Shomo (@ShomoBits) introduces the new 360-degree Threat Assessment ...

The November attacks using Shamoon Malware in Saudi Arabia demonstrate the need for a "continuous response" mindset and powerful endpoint detection and response (EDR) solutions. See how EnCase Endpoint Security can help prevent or mitigate data loss...

Last week the FTC issued a new paper and accompanying video advising business on what to do in the event of a data breach. Having the right technology in place *before* a breach can make the difference between early detection and rapid, measured resp...

Business travel is a fact of modern life. We are all increasingly mobile and carrying an increasing number of devices. This proliferation of connected devices beyond the corporate network is a nightmare for security teams, but there are some simple s...

EnCase Forensic 8.02 is available now. This post highlights one of the changes that we added in direct response to examiner feedback. One of the most common requests we received was to bring back the option to view keyword search results by hit vers...

To that end, I’m excited to announce the release of EnCase Endpoint Investigator 8.02. 8.02 delivers a solution for one of the most frustrating situations investigators deal with – collecting data from off-the-network endpoints through a new Enhanced...

Tell us “How you EnCase.” If you have a favorite tip, trick, or shortcut – send it to us at contests@guid.com and you’ll be automatically entered for a chance to win a $100-dollar Amazon gift card and other Guidance prizes.

Beginning in October, EnCase Enterprise will be known as EnCase Basic. The digital security landscape has changed and so have the products we offer at Guidance. If your organization is a current EnCase Enterprise (now EnCase Basic) customer, the chan...

The best security software in the world can’t stop a user from clicking a malicious link or setting their password as ‘password.’ We’ve listed 5 simple tips below that can help anyone be more cyber aware.

Point-of-sale (PoS) devices are machines used by businesses to conduct a retail transaction (i.e. a credit card swiper). Despite new technologies like chip-enabled credit cards and mobile payment systems, PoS malware continues to be a major threat, d...

Because we’ve been active in digital forensics for almost twenty years, we know how to make completing digital investigations easier. At Guidance Software we build products around four principle expectations of forensic hardware

"The long awaited release of EnCase Forensic 8 is here.
"
Working with the forensic community, we developed EnCase Forensic 8 with the users in mind. Our product management team spent time talking with customers, reviewing user requested enhancements...

Data breach insurance, if it were like auto insurance, would be pretty straightforward: You run up a bill responding to a data breach or get into a fender bender, file a claim, the reimbursement comes in, and maybe the rate goes up a little as your r...

As a digital forensics professional, you know how to get on the electronic trail and help prove facts in civil and criminal cases. But when opposition attorneys are seasoned and crafty, explaining how you connected the digital dots can make the witne...

The time has come for forensic and security investigators to break down the door to IT departments and help them prepare for a coming data crime wave that will require companies to spend up to 60 percent of security budgets on data breach response by...

By now, you may have heard about our new CEIC industry roundtable sessions for professionals in retail, finance, and healthcare. These focused, media-free sessions provide a forum for security and e-discovery specialists to discuss current trends and...

The roundtable sessions were created to address specific cybersecurity and e-discovery needs, because each industry is influenced by different factors, uses different workflows, and stores different types of sensitive data that determines unique crim...

You may be among the many organizations who are considering deploying enterprise file synchronization and sharing solutions (EFSS) or cloud repositories to empower your mobile workers, implement BYOD policies, and support collaboration. You’re in goo...

Attackers are always looking for new vulnerabilities to exploit technologies with large-scale adoption or use/create/modify malware that changes just enough to avoid known detection methods as it propagates through a corporate network.

During the first week of December 2014, Guidance Software ran a computer forensics training course at its Slough offices in the UK, with the aim of helping forensic practitioners to understand and use EnCase as part of their investigations.